- Energy Efficient Wireless Sensor Networks
- Cloud Computing and Resource Management
- Energy Harvesting in Wireless Networks
- IoT and Edge/Fog Computing
- Interconnection Networks and Systems
- Mobile Ad Hoc Networks
- Chaos-based Image/Signal Encryption
- Cloud Data Security Solutions
- IoT-based Smart Home Systems
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Distributed systems and fault tolerance
- Cryptography and Data Security
- Cryptographic Implementations and Security
- Distributed and Parallel Computing Systems
- Service-Oriented Architecture and Web Services
- Coding theory and cryptography
- Reservoir Engineering and Simulation Methods
- Image Enhancement Techniques
- Air Quality Monitoring and Forecasting
- Internet of Things and AI
- Supercapacitor Materials and Fabrication
- Advanced Steganography and Watermarking Techniques
- Security in Wireless Sensor Networks
- UAV Applications and Optimization
Guru Nanak Dev University
2015-2025
Barkatullah University
2025
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2022-2024
Alzaiem Alazhari University
2023
Yes Technologies (United States)
2019
Gautam Buddha University
2012-2018
Delft University of Technology
2017
Volvo (Sweden)
2015
Government Medical College, Amritsar
2015
Reliance Industries (United States)
2012
A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device quantity of energy. One the primary roles node is to store transmit collected information base station (BS). Thus, life span main criterion for efficient design FANETS Network, always have resources. In this paper, we present methodology an energy-efficient clustering algorithm collecting transmitting data based on Optimized Low-Energy...
Global warming is one of the most compelling environmental threats today, as rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts that thermal power plants mainly generate. Primarily fossil fuels like coal oils are used for generation these induce various problems such global ozone layer depletion, which can even become cause premature deaths living beings. recent research...
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power high mobility. Due these topological restrictions, FANETS considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) can be used solve complex issues when static dynamic routings fail. Evolutionary algorithm-based clustering techniques,...
In the past few decades, cutting-edge information and communication technology has been used in several ways to keep an eye on marine environment. Underwater wireless sensor networks (UWSNs) can measure amount of water soil conditions, such as salinity, moisture, movements, predict landslides. UWSNs are made up many underwater nodes (WSNs) that spread out across thalassic These have uses, including data collection, navigation, resource analysis, surveillance, disaster prediction, etc....
For efficient running of wireless sensor network applications, energy conservation the sensors becomes a prime paradigm for prolonging lifetime network. Taking this aspect into consideration, cluster head weight selection method called Cluster Chain Weight Metrics approach (CCWM) has been discussed that takes service parameters enhancing performance overall In clustering based one main concerns is appropriate heads in and formation balanced clusters. are selected first on metric then place....
Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made detect forest using variety of approaches, including optical fire sensors, and satellite-based technologies, all which unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is thriving field can be used successfully. This paper describes unique clustering approach that identifies presence zone in transfers sensed data base station as soon feasible via wireless...
Cloud computing facilitates the storage and management of huge volumes data. It offers flexibility for retrieving data anytime anywhere. In recent years, storing onto cloud achieved fame among corporations as well private users. Although, is drawing a lot attention still there are security, privacy, reliability interoperability concerns that need to be taken care. To deal with these issues, encryption comes rescue. Encrypting before uploading it prevents unauthorized users from accessing A...
Visible Light Communication (VLC) has emerged as a promising technology for high-speed wireless communication, which employs the visible spectrum to transmit information. As title indicates, IEEE 802.15.7 is new standard dedicated VLC networks that introduces specializations match characteristics and needs of this medium. In networks, one key challenges scheduling Guaranteed Time Slots (GTS) efficiently better network performance minimum end-to-end delay while delivering reliable data. The...
Supply Chain Management (SCM) in the Indian defense sector represents a strategic function that supports operational readiness and national preparedness. This study undertakes qualitative analysis based solely on secondary data sources to examine key dimensions of logistics operations. The research draws from government audit reports, policy documents, procurement reviews, institutional publications synthesize insights into current SCM practices. identifies several areas interest, including...
Effective supply chain management (SCM) is crucial for India's defense sector to ensure operational readiness and national security. However, persistent challenges in inventory control logistics coordination continue impact efficiency. This study examines the dynamics Gwalior, Madhya Pradesh, which holds strategic potential due industrial zones such as Malanpur Banmore. Despite this, local contribution procurement remains limited, evident Jabalpur Vehicle Plant's sourcing of only 10%...
Shared-buffer ATM switches can have severe cell loss under asymmetrical or heavy loading conditions, which makes buffer management essential. In this paper, we study the shared-buffer system class of all work-conserving pushout policies and derive properties optimal policy, gives least-average expected total probability. a 2/spl times/2 with independent identically distributed Bernoulli arrivals, show that policy be characterized by single threshold. case correlated modeled discrete batch...
In this paper, we have proposed an energy efficient chain based protocol which is improvement over ECBSN (Energy Efficient Chain Based Sensor Network). has certain deficiencies like the non optimal selection of leader nodes in rounds, aggregation and transmission data by head that leads to unbalanced consumption. Aiming at these problems, improved proposed. IECBSN adopts a new method on value (SV) parameter .To lower consumption further, one more level hierarchy been added with node, will...
Mobile ad hoc network (MANET) is a wireless without fixed infrastructure. Routing of MANET and its security are critical challenges due unique features. There many secure routing protocols presented. In this paper, an extensive survey various in The analysed terms end to delay, throughput, packet delivery ratio, minimum power, total energy consumed, normalised load, loss cost, battery capacity, drain rate control overhead.